Home > Articles > Security

Security

RSS Feed Subscribe to this topic  RSS details

722 Items

Sort by Date | Title

Writing Insecure C, Part 3
By David Chisnall
Oct 24, 2008
David Chisnall concludes his series on insecure C code with a discussion of strings, along with some of the more advanced problems that people encounter with C.
Safety First on craigslist
By Jenna Lloyd
Oct 22, 2008
This chapter shows you how to protect yourself when using craigslist.
CCNA Exam 640-553 Exam Cram: Implementing Secure Management and Hardening the Router
By Eric Stewart
Oct 21, 2008
This chapter outlines some methods to protect the confidentiality of remote sessions to the router.
Writing Insecure C, Part 2
By David Chisnall
Oct 17, 2008
Continuing his series on insecure C, David Chisnall points out some problems arising from handling of integers and memory in C.
Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
By Gary McGraw, Brian Chess
Oct 15, 2008
Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
Writing Insecure C, Part 1
By David Chisnall
Oct 10, 2008
David Chisnall takes a look at some of the pitfalls involved in writing secure code in C, with a guided tour of insecure code.
The Truth About Identity Theft: Truth 27 -- ATM Scams
By Jim Stickley
Oct 2, 2008
Can someone build a fake ATM to steal your card and pin? The author did. Learn how he constructed a fake ATM and how to protect yourself.
VoIP Threat Taxonomy
By Patrick Park
Sep 24, 2008
This chapter categorizes the main threats against VoIP service and explains their impact and possible methods of protection.
Software [In]security: Getting Past the Bug Parade
By Gary McGraw
Sep 17, 2008
Gary McGraw explains why more attention should be paid to finding software flaws through the use of threat modeling and architectural risk analysis.
Security Analysis of a Scan-to-PC Solution
By Seth Fogie
Sep 12, 2008
Seth Fogie provides a Security Analysis of "Scan-to-PC" solutions and highlights several security issues that need to be addressed before implementation.
Spam: Unwanted Email from Hell
By Andy Walker
Sep 9, 2008
Andy Walker explains what spam is, where it comes from, and what to do about it.
No Time to Patch
By Randy Nash
Sep 5, 2008
Randy Nash discusses the problems of exploits and malicious code and offers some suggestions to reduce the time to patch these vulnerabilities.
Visual Security Analysis
By Raffael Marty
Aug 26, 2008
Raffael Marty shows different ways of analyzing security data using visual approaches.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
Software [In]security: Software Security Demand Rising
By Gary McGraw
Aug 11, 2008
Gary McGraw breaks down the numbers from 2007, showing that software security is making headway in the enterprise even against economic headwinds.
Perception of Security Risk: Fear, Uncertainty, and Doubt
By Randy Nash
Jul 28, 2008
Why do so many security product vendors use it as part of the sales pitch? As Randy Nash explains, because it works.
A Brief History of (Internet) Time: From the Beginnings of Malicious Code to Their Likely Future
By Randy Nash
Jul 21, 2008
Randy Nash looks at the complex relationship between computing power, the growth of the Internet, and the changes in malicious code over time.
Software [In]security: Application Assessment as a Factory
By Gary McGraw
Jul 17, 2008
Gary McGraw explains how creating an application assessment factory can salvage the power of the cost per defect metric while mitigating the potential for its misuse.
The Building Blocks in a Cisco NAC Appliance Design
By Alok Agrawal, Jamey Heary, Jerry Lin, Chad Sullivan
Jul 8, 2008
This chapter focuses on the building blocks available with the Cisco NAC Appliance solution.
Security Features on Switches
By Yusuf Bhaiji
Jul 4, 2008
This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.

<< < Prev Page 7 8 9 10 11 Next >